-
81Published 2018Table of Contents: “… Cryptography and Cryptanalysis -- Symmetric Key Cryptanalysis -- Theory -- Secure Computations and Protocols.…”
Full Text via HEAL-Link
Electronic eBook -
82Published 2013Table of Contents: “… -- On Minimal and Quasi-minimal Linear Codes -- A Code-Based Undeniable Signature Scheme -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
83Published 1999Table of Contents: “…Cryptanalysis I -- Cryptanalysis of RSA with Private Key d Less than N 0.292 -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
84Published 2003Table of Contents: “…Cryptanalysis I -- Cryptanalysis of the EMD Mode of Operation -- On the Optimality of Linear…”
Full Text via HEAL-Link
Electronic eBook -
85Published 2000Table of Contents: “… Factoring Device -- Cryptanalysis I: Digital Signatures -- Noisy Polynomial Interpolation and Noisy Chinese…”
Full Text via HEAL-Link
Electronic eBook -
86Published 2003Table of Contents: “…Public Key Cryptanalysis I -- Factoring Large Numbers with the TWIRL Device -- New Partial Key…”
Full Text via HEAL-Link
Electronic eBook -
87Table of Contents: “… Ciphers -- Brute-Force Attacks -- Differential Cryptanalysis -- Linear Cryptanalysis -- Advanced Topics…”
Full Text via HEAL-Link
Electronic eBook -
88Published 2002Table of Contents: “… Characteristics of Substitution Distances -- Truncated Differential Cryptanalysis of Camellia -- Improved…”
Full Text via HEAL-Link
Electronic eBook -
89Published 2006Table of Contents: “…Stream Ciphers I -- Cryptanalysis of Achterbahn -- Cryptanalysis of Grain -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
90Published 2007Table of Contents: “…Reduced Complexity Attacks on the Alternating Step Generator -- Extended BDD-Based Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
91Published 2007Table of Contents: “… -- Cryptography -- Genetic Algorithm Based Steganography Using Wavelets -- Cryptanalysis of Tso et al.’s ID-Based…”
Full Text via HEAL-Link
Electronic eBook -
92Published 2013Table of Contents: “… Cipher -- Block Cipher Cryptanalysis -- Related-Key Slide Attacks on Block Ciphers with Secret Components…”
Full Text via HEAL-Link
Electronic eBook -
93Table of Contents: “… Key Cryptography -- Generic Complexity and Cryptanalysis -- Distributional Problems and the Average…”
Full Text via HEAL-Link
Electronic eBook -
94Published 2015Table of Contents: “…Cryptographic Engineering -- Privacy -- Cryptanalysis.…”
Full Text via HEAL-Link
Electronic eBook -
95Published 2000Table of Contents: “…Cryptanalysis I -- Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
96Published 2017Table of Contents: “…Cryptanalysis -- Lightweight designs -- Implementation challenges.…”
Full Text via HEAL-Link
Electronic eBook -
97Published 2016Table of Contents: “… -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES…”
Full Text via HEAL-Link
Electronic eBook -
98Published 2001Table of Contents: “…Cryptanalysis I -- Analysis of IS-95 CDMA Voice Privacy -- Attacks on Additive Encryption…”
Full Text via HEAL-Link
Electronic eBook -
99Published 2005Table of Contents: “… -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic…”
Full Text via HEAL-Link
Electronic eBook -
100Published 2012Table of Contents: “…Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems -- Cryptanalysis vs…”
Full Text via HEAL-Link
Electronic eBook